Reed Elsevier

Displaying 1-40 of 946 results

  • White Papers // May 2012

    An Energy-Centric Handover Decision Algorithm for the Integrated LTE Macrocell - Femtocell Network

    Femtocells are attracting a fast increasing interest now-a-days, as a promising solution to improve indoor coverage and system capacity. Due to the short transmit-receive distance, femtocells can greatly lower transmit power, prolong handset battery life, and enhance the user-perceived Quality of Service (QoS). On the other hand, technical challenges still...

    Provided By Reed Elsevier

  • White Papers // May 2012

    Reducing Virtual-to-Physical Address Translation Overhead in Distributed Shared Memory Based Multi-Core Network-on-Chips According to Data Property

    In Network-on-Chip (NoC) based multi-core platforms, Distributed Shared Memory (DSM) preferably uses virtual addressing in order to hide the physical locations of the memories. However, this incurs performance penalty due to the Virtual-To-Physical (V2P) address translation overhead for all memory accesses. Based on the data property which can be either...

    Provided By Reed Elsevier

  • White Papers // Apr 2012

    Node Localization Through Physical Layer Network Coding: Bootstrap, Security, and Accuracy

    Previous research on Physical-layer Network Coding (PNC) focuses on the improvements in bandwidth usage efficiency. Its capability to assist wireless nodes in localization was first discussed. In that paper, however, the authors discussed only the basic idea to detect and separate the interfered signals for calculating the node positions. Many...

    Provided By Reed Elsevier

  • White Papers // Apr 2012

    A Green Handover Protocol in Two-Tier OFDMA Macrocell - Femtocell Networks

    Femtocells are a promising technology to improve network performance with the short-range, low-power, and cost-beneficial small base stations. A femtocell is a low-power wireless access point that operates in licensed spectrum to connect a standard device to an operator's network using a Digital Subscriber Line (DSL) connection. Most of the...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Secure Neighbor Discovery and Wormhole Localization in Mobile Ad Hoc Networks

    Neighbor discovery is an important part of many protocols for wireless ad hoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance deteriorate. In networks affected by relay attacks, also known as wormholes, the failure may be more subtle. The wormhole may selectively deny or degrade...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Network Coding-Based Cooperative ARQ Scheme for VANETs

    In this paper, the authors introduce a novel network coding-based Medium Access Control (MAC) protocol for Vehicular Ad-hoc NETworks (VANETs) that use cooperative Automatic Repeat reQuest (ARQ) techniques. Their protocol coordinates the channel access among a set of relays capable of using network coding in order to minimize the number...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Towards a Reputation-Based Routing Protocol to Contrast Blackholes in a Delay Tolerant Network

    A Delay Tolerant Network (DTN) relies on the implicit assumption that nodes cooperate towards message forwarding. However, this assumption cannot be satisfied when there are malicious nodes acting as blackholes and voluntarily attracting and dropping messages. In this paper, the authors propose a reputation-based protocol for contrasting blackholes. Every node...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    Methodology for Public Administrators for Selecting Between Open Source and Proprietary Software

    The public sector needs to change over to communicating digitally. This development makes great demands both on work processes in the public sector and on the Information Technology systems, on which e-government is based. From the economic perspective, the change-over poses great challenges, as huge investments will have to be...

    Provided By Reed Elsevier

  • White Papers // Mar 2012

    A Bandwidth and Effective Hit Optimal Cache Scheme for Wireless Data Access Networks With Client Injected Updates

    In this paper, the authors propose an optimal cache replacement policy for data access applications in wireless networks where data updates are injected from all the clients. The goal of the policy is to increase effective hits in the client caches and in turn, make efficient use of the network...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    Towards Mobile Intelligence: Learning From GPS History Data for Collaborative Recommendation

    With the increasing popularity of location-based services, the authors have accumulated a lot of location data on the Web. In this paper, the authors are interested in answering two popular location-related queries in their daily life: if the people want to do something such as sightseeing or dining in a...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    A Simulation Modelling Tool for Distributed Virtual Environments

    Distributed Virtual Environments simulate the behavior and activities of a great number of users interacting in a virtual world over a wide area network. The size of the virtual worlds and the tremendous number of users that these environments are called to support require additional bandwidth and computational resources. For...

    Provided By Reed Elsevier

  • White Papers // Feb 2012

    Sleep-Based Topology Control in the Ad Hoc Networks by Using Fitness Aware Learning Automata

    Learning automata have been found to be useful in the systems with incomplete knowledge. Therefore, it can be used as a tool to solve problems of Ad Hoc networks, where nodes are mobile and operate within a dynamic environment, which entails possibly unknown and time varying characteristics. In this paper,...

    Provided By Reed Elsevier

  • White Papers // Jan 2012

    Team Formation and Steering Algorithms for Underwater Gliders Using Acoustic Communications

    In order to take measurements in space and time from the under-sampled vast ocean, it is necessary to employ multiple autonomous underwater vehicles, such as gliders, that communicate and coordinate with each other. These vehicles need to form a team in a specific formation, steer through the 3D region of...

    Provided By Reed Elsevier

  • White Papers // Jan 2012

    Referential Integrity Quality Metrics

    Referential integrity is an essential global constraint in a relational database, that maintains it in a complete and consistent state. In this paper, the authors assume the database may violate referential integrity and relations may be de-normalized. They propose a set of quality metrics, defined at four granularity levels: database,...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    A Historical Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing

    Cloud computing promises an open environment where customers can deploy IT services in pay-as-you-go fashion while saving huge capital investment in their own IT infrastructure. Due to the openness, various malicious service providers can exist. Such service providers may record service requests from a customer and then collectively deduce the...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    ActiSen: Activity-Aware Sensor Network in Smart Environments

    A sensor network, unlike a traditional communication network, provides high degree of visibility into environmental physical processes. Therefore, its operation is driven by the activities in the environment. In long-term operations, these activities usually show certain patterns which can be learned and utilized to optimize network design. However, this has...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Efficient Audit Service Outsourcing for Data Integrity in Clouds

    Cloud-based outsourced storage relieves the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. However, the fact that clients no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data. To avoid the security...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Practical and Secure Localization and Key Distribution for Wireless Sensor Networks

    In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with legitimate in-network communication. In this paper, the authors introduce Secure Walking GPS, a practical and cost effective secure localization and key distribution solution for...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    A Structural Approach for PoP Geo-Location

    Inferring PoP level maps is gaining interest due to its importance to many areas, e.g., for tracking the Internet evolution and studying its properties. In this paper, the authors introduce a novel structural approach to automatically generate large scale PoP level maps using trace-route measurement from multiple locations. The PoPs...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Talent Scouting in P2P Networks

    Record labels would like to identify potential artists as early as possible in their career, before other companies approach the artists with competing contracts. However, there are a huge number of new artists, and the process of identifying the ones with high success potential is labor intensive. This paper demonstrates...

    Provided By Reed Elsevier

  • White Papers // Dec 2011

    Low-Dimensional Signal-Strength Fingerprint-Based Positioning in Wireless LANs

    Accurate location awareness is of paramount importance in most ubiquitous and pervasive computing applications. Numerous solutions for indoor localization based on IEEE802.11, Bluetooth, ultrasonic and vision technologies have been proposed. This paper introduces a suite of novel indoor positioning techniques utilizing Signal-Strength (SS) fingerprints collected from Access Points (APs). The...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    ORACLE: Mobility Control in Wireless Sensor and Actor Networks

    Mobile actor is a promising tool for Wireless Sensor and Actor Networks (WSANs) provisioning energy and time efficient data collection. In this paper, the authors study actors' mobility control in WSANs for efficient events detecting in terms of time and energy consumption. They introduce an innovative approach ORACLE, to make...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Pure Embedding of Attribute Grammars

    Attribute grammars are a powerful specification paradigm for many language processing tasks, particularly semantic analysis of programming languages. Recent attribute grammar systems use dynamic scheduling algorithms to evaluate attributes on demand. In this paper, the authors show how to remove the need for a generator, by embedding a dynamic approach...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Trust Negotiation Based Security Framework for Service Provisioning in Load-Balancing Clusters

    The OKKAM project aims at enabling the Web of Entities, a global digital space for publishing and managing information about entities. The project provides a scalable and sustainable infrastructure, called the Entity Name System (ENS), for the systematic reuse of global and unique entity identifiers. The ENS provides a collection...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    On Scrambling the Burrowse-Wheeler Transform to Provide Privacy in Lossless Compression

    The usual way of ensuring the confidentiality of the compressed data is to encrypt it with a standard encryption algorithm. Although the computational cost of encryption is practically tolerable in most cases, the lack of flexibility to perform pattern matching on the compressed data due to the encryption level is...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    QoS and Preemption Aware Scheduling in Federated and Virtualized Grid Computing Environments

    Resource provisioning is one of the challenges in federated Grid environments. In these environments each Grid serves requests from external users along with local users. Recently, this resource provisioning is performed in the form of Virtual Machines (VMs). The problem arises when there are insufficient resources for local users to...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Robust Hashing Algorithm Based on SURF for Video Copy Detection

    To protect digital video from unauthorized use, video copy detection is an active research topic in the field of copyright control. For content-based copy detection, the key issue is to extract robust transformation-invariant feature. In this paper, a robust hashing algorithm based on Speeded Up Robust Feature (SURF) and Ordinal...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    A Semantically Enhanced Service Repository for User-Centric Service Discovery and Management

    User centricity represents a new trend in the currently flourishing service oriented computing era. By upgrading end-users to prosumers (producer+consumer) and involving them in the process of service creation, both service consumers and service providers can benefit from a cheaper, faster, and better service provisioning. The EU-IST research project OPUCE...

    Provided By Reed Elsevier

  • White Papers // Nov 2011

    Tracing and Revoking Scheme for Dynamic Privileges Against Pirate Rebroadcast

    Broadcast encryption provides a convenient method to distribute digital content to subscribers over an insecure broadcast channel so that only the qualified users can recover the data. Currently, there are only two broadcast encryption schemes designed for users with different privileges. In these schemes, users with higher privileges can decrypt...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    100GbE and Beyond for Warehouse Scale Computing Interconnects

    Increasing broadband penetration in the last few years has resulted in a dramatic growth in innovative, bandwidth-intensive applications that have been embraced by the consumers. Coupled with this consumer trend is the migration from local compute/storage model to a cloud computing paradigm. As computation and storage continues to move from...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Long-Term Availability Prediction for Groups of Volunteer Resources

    Volunteer computing uses the free resources in Internet and Intranet environments for large-scale computation and storage. Currently, 70 applications use over 12 Peta-FLOPS of computing power from such platforms. However, these platforms are currently limited to embarrassingly parallel applications. In an effort to broaden the set of applications that can...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Looking Ahead in Pervasive Computing: Challenges and Opportunities in the Era of Cyber - Physical Convergence

    The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users: virtually everything will be enabled to source information and respond to appropriate stimuli. In this technology-rich scenario, real-world components interact with cyberspace via sensing, computing and communication...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Biconnecting a Network of Mobile Robots Using Virtual Angular Forces

    This paper addresses the problem of self-deploying a swarm of wireless mobile robots in a biconnected fashion. The motivations for deploying robotic sensor networks in general include accessing places where human cannot go (e.g. remote planets, underwater area, dangerous spots with chemical or radioactive leaks), or automating fastidious large scale...

    Provided By Reed Elsevier

  • White Papers // Oct 2011

    Compressive Sampling Based Differential Detection for UWB Impulse Radio Signals

    Non-coherent detectors significantly contribute to the practical realization of the UltraWide-Band (UWB) Impulse-Radio (IR) concept, in that they allow avoiding channel estimation and provide highly efficient reception capabilities. Complexity can be reduced even further by resorting to an all-digital implementation, but Nyquist-rate sampling of the received signal is still required....

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    TDMA Scheduling for Event-Triggered Data Aggregation in Irregular Wireless Sensor Networks

    Multi-hop wireless sensor networks often use a TDMA schedule to collect data periodically from multiple locations within a large area. If the measurements from neighboring sensors are cross-correlated, they can be aggregated and compressed as they travel to the data sink. In order for data aggregation to occur quickly, the...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Content Delivery and Caching From a Network Provider's Perspective

    An ongoing challenge in telecommunication is to integrate a variety of services on broadband access platforms at increasing transmission speed. Traditional Internet services, such as file transfer, email and web browsing, are now running on common multi-service IP platforms together with voice, video and television over IP, online gaming, P2P...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Session Level Flow Classification by Packet Size Distribution and Session Grouping

    Classifying traffic into specific network applications is essential for application-aware network management and it becomes more challenging because modern applications complicate their network behaviors. While port number-based classifiers work only for some well-known applications and signature-based classifiers are not applicable to encrypted packet payloads, researchers tend to classify network traffic...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    A New Adaptive Receiver-Initiated Scheme for Mitigating Starvation in Wireless Networks

    Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) has been adopted by the IEEE 802.11 standard and provides good performance when all transmitters are within the range of each other. Unfortunately, in multi-hop topologies, the asymmetric view of the channel state leads to a throughput distribution where a few flows...

    Provided By Reed Elsevier

  • White Papers // Sep 2011

    Research Challenges Towards the Future Internet

    The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture and protocols well beyond their original design. This calls for extraordinary research efforts at all levels of...

    Provided By Reed Elsevier

  • White Papers // Aug 2011

    TCP Slow Start With Fair Share of Bandwidth

    The initial start-up performance of TCP largely depends on two parameters - ssthresh and cwnd. When these values are not accurate, TCP cannot utilize the bandwidth fully or may generate multiple packet drops. Unfortunately, estimating these parameters is not easy since little network state information is available for the TCP...

    Provided By Reed Elsevier